1998-06-30 - NSA and crypto algorithms

Header Data

From: bill payne <billp@nmol.com>
To: jy@jya.com
Message Hash: 952d75953f34e9fe39a7fca5075e2125748a1b02875414a9af2b5c41505d9e87
Message ID: <359934DE.1B4@nmol.com>
Reply To: N/A
UTC Datetime: 1998-06-30 18:59:47 UTC
Raw Date: Tue, 30 Jun 1998 11:59:47 -0700 (PDT)

Raw message

From: bill payne <billp@nmol.com>
Date: Tue, 30 Jun 1998 11:59:47 -0700 (PDT)
To: jy@jya.com
Subject: NSA and crypto algorithms
Message-ID: <359934DE.1B4@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain


It is EASY to make mistakes when designing crypto algorithms.

SECRECY works against NSA in that their work doesn't get 
proper evaluation by HOSTILE referees.  Like
http://www.jya.com/skipjack-bs2.htm

NSA does have good experiences at fielding crypto devices.

My suprise at gaining access to NSA crypto algorithms was how
simple they were.







Thread